Главная
Study mode:
on
1
Introduction
2
What is Targeted
3
Code of Conduct
4
Is RDP Legal
5
We Are Not The Owners
6
Fair Price Trading
7
Read The Manual
8
What You Buy
9
DP Log Cleaner
10
RDPPea
11
Server List
12
US Machines
13
University of Washington
14
Phoenix
15
Credit Card Processing
16
Washington DC
17
Fraud
18
Price Impact
19
Top 5 States
20
Command and Control
21
RDP Processes
22
Indicators
23
Mac marketplaces
24
Uptime
25
Endpoints
Description:
Explore the evolution of commodity programs into advanced threats in this 53-minute conference talk from BSidesLV 2016. Delve into the concept of "Operation Escalation" as Israel Barak breaks down the intricate details of targeted attacks, legal considerations surrounding Remote Desktop Protocol (RDP), and the ethical implications of cybersecurity research. Gain insights into various tools and techniques used by threat actors, including DP Log Cleaner, RDPPea, and server lists. Examine real-world examples involving institutions like the University of Washington and analyze the impact on credit card processing systems. Investigate command and control structures, RDP processes, and key indicators of compromise. Learn about Mac marketplaces, uptime considerations, and endpoint security in this comprehensive exploration of emerging cyber threats.

Operation Escalation - How Commodity Programs Are Evolving Into Advanced Threats

BSidesLV
Add to list